Security Audits definition

Security Audits are audits conducted to determine the compliance of network Devices that have published security standards and to disclose security vulnerabilities and may include, but are not limited to, port scanning and port connections, assessing services by checking versions and responses to certain requests, and crawling websites to perform testing of forms, application responses, or to confirm the existence of certain files, downloading and scanning the source code files of websites.
Security Audits. The County may perform security reviews and testing. Such testing shall ensure all pertinent County security standards are in place. Contractor shall reasonably cooperate with all County security reviews and testing, including but not limited to penetration testing of any cloud-based solution provided by Contractor to County under this Contract. Contractor shall inform County of any security audit or assessment performed by Contractor or at Contractor’s behest or direction that includes County hosted content, within sixty (60) calendar days of such audit or assessment. Notices: Any and all notices permitted or required to be given hereunder shall be deemed duly given (1) upon actual delivery, if delivery is by hand; (2) upon delivery by the United States mail, if delivery is by postage paid registered or certified return receipt requested mail; or (3) upon delivery via electronic mail with paper copy delivered by United States mail or hand to Party. Each such notice shall be sent to the respective Party at the address indicated below or to any other address as the respective Parties may designate from time to time. For Contractor: Attn: Xxxxxx Xxxx Title: Chief Operations Officer Phone 1: 000.000.0000 Phone 2: (000) 000-0000 Email: xxxxxx@xxxxxxxx.xxx For County: County of Orange, Information Technology Attn: Xxx Xxxxx, Project Manager 714-567-5023 0000 X. Xxxx Xxxxxx Xxxxx Xxx, XX 00000 Xxx.Xxxxx@xxxx.xxxxx.xxx For County: County of Orange, Information Technology Attn: Xxx Xxxxxx, Deputy Purchasing Agent 714-567-7488 0000 X. Xxxx Xxxxxx Xxxxx Xxx, XX 00000 Xxxxxxx.Xxxxxx@xxxx.xxxxx.xxx Equal Employment Opportunity: The Contractor shall comply with Executive Order 11246, “Equal Employment Opportunity”, as amended by Executive order 11375, “Amending Executive Order 11246 relating to Equal Employment Opportunity”, and as supplemented by regulations at 41 CFR part 60, “Office of Federal Contract Compliance Programs, Equal Employment Opportunity, Department of Labor.”
Security Audits. We conduct regular security audits and vulnerability assessments to identify and address potential security threats. This will include regular penetration testing by a third party.

Examples of Security Audits in a sentence

  • The Contractor must contract with a third -party to perform a yearly Information Security Audits of their primary and backup datacenter.

  • Security Audits will be conducted periodically by the System Admin Staff in pursuant to the baseline standards defined in the HUD 2004 Data and Technical Standards.

  • On-site Security Audits must not interfere with SAS’ normal business operations and will not exceed three (3) SAS Business Days.

  • Customer will conduct on-site Security Audits at SAS’ corporate headquarters in Cary, North Carolina, USA during SAS’ normal business hours.

  • Customer may request additional Security Audits during the Term of an Order Form provided, however, that Customer may not conduct more than one (1) Security Audit during any twelve (12) month period.

  • Security Audits will be conducted periodically by the DCA Staff pursuant to the baseline standards defined in the HUD 2004 Data and Technical Standards.

  • The rights and obligations of the Parties that may apply to time periods after the termination of this Agreement shall survive any termination of this Agreement, including, but not limited to, the rights and obligations under Sections 4 (Ownership of Licensed Material), 6 (Confidentiality), 7 (Security Audits; Notice of Security Breach), 8 (Representations & Warranties), 9 (Indemnification (for a period of two years after termination)), and Section 13 (Miscellaneous).

  • Security Audits & Remediation CONTRACTOR will audit the security of the systems and processes used to provide any and all cloud computing or hosting services, including those of the data centers used by CONTRACTOR to provide any and all cloud computing or hosting services to the State of Minnesota.

  • Security Audits – Vulnerability Assessments We welcome external security audits and assessments, but need to be informed of any operation that is ongoing on our systems.

  • These Security Audits will focus on the following areas: Physical access to Systems with access to Comparable Database Data Disaster Protection and Recovery; Disposal; System Monitoring User; Authentication; Electronic Data Submission; Electronic Data Storage Security; Privacy Standards.


More Definitions of Security Audits

Security Audits. We periodically subject our software to penetration tests. We have this done by a specialized and certified external party.
Security Audits. Each Contract year, County may perform or have performed security reviews and subsequent verification testing of Contractors security controls and processes (“Audit”) based on a solution infrastructure review plan. Such Audit shall ensure all pertinent County security standards are in place. Contractor shall inform County of any security audit performed that includes County Data, within sixty (60) calendar days of such Audit. Contractor will provide to County upon request the most recent third party SOC 2 Type 2 report. County may also have the right to review Plans of Actions and Milestones (POA&M) for any outstanding items identified by the SOC 2 Type 2 report requiring remediation as it pertains to the confidentiality, integrityP,agaen2d0 of 240 File Folder: C030087 Page 20 of 240 availability of the County Data. Additionally, the County reserves the authority to conduct unannounced or scheduled audits of Contractor's facilities and practices to verify compliance with applicable statutes, regulations, and policies in accordance with CJIS 5.11.

Related to Security Audits

  • Security Assets means all assets of the Chargor the subject of any security created by this Deed.

  • Security Agreements means the U.S. Security Agreement and the Canadian Security Agreement.

  • Intellectual Property Security Agreements has the meaning specified in the Security Agreement.

  • Search ’ means to review, manually or by auto- mated means, agency records for the purpose of locating those records which are responsive to a request.

  • Security Agreement Collateral means all "Collateral" as defined in the Security Agreement.

  • Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).

  • Intellectual Property Security Agreement means the Intellectual Property Security Agreement dated as of the Closing Date among the Loan Parties and the Collateral Agent, granting a Lien in the Intellectual Property and certain other assets of the Loan Parties, as amended and in effect from time to time.

  • Inventory Appraisal means (a) on the Closing Date, the appraisal prepared by Great American Group dated January 22, 2008 and (b) thereafter, the most recent inventory appraisal conducted by an independent appraiser firm pursuant to Section 9.2(b).

  • Patent Security Agreements means the Patent Security Agreements made in favor of Agent, on behalf of itself and Lenders, by each applicable Credit Party.

  • Patent Collateral means all Patents, whether now owned or hereafter acquired by the Company that are associated with the Business.

  • UCC Searches has the meaning set forth in Section 3.1(v) hereof.

  • Security Tests means conduct tests of the processes and countermeasures contained in the Security Plan.

  • Copyright Security Agreements means the Copyright Security Agreements made in favor of Agent, on behalf of itself and Lenders, by each applicable Credit Party.

  • Trademark Security Agreements means the Trademark Security Agreements made in favor of Agent, on behalf of itself and Lenders, by each applicable Credit Party.

  • Security Account “Software”, and “Supporting Obligations”.

  • Patent Security Agreement means each Patent Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit B.

  • Intellectual Property Collateral means, collectively, the Patents, Trademarks, Copyrights, Intellectual Property Licenses and Goodwill.

  • Intellectual Property Security Agreement Supplement has the meaning specified in the Security Agreement.

  • Security freeze means a notice placed in a credit report, at the

  • Request regarding a list of collateral means a record authenticated by a debtor requesting that the recipient approve or correct a list of what the debtor believes to be the collateral securing an obligation and reasonably identifying the transaction or relationship that is the subject of the request.

  • Patent and Trademark Security Agreement means the Patent and Trademark Security Agreement by the Borrower in favor of the Lender of even date herewith.

  • Trademark Security Agreement means each Trademark Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit D.

  • Collateral has the meaning set forth in Section 2.

  • Trade Secrets Collateral means all common law and statutory trade secrets and all other confidential or proprietary or useful information and all know-how obtained by or used in or contemplated at any time for use in the business of the Grantor (all of the foregoing being collectively called a "Trade Secret"), whether or not such Trade Secret has been reduced to a writing or other tangible form, including all documents and things embodying, incorporating or referring in any way to such Trade Secret, all Trade Secret licenses, including each Trade Secret license referred to in Schedule V attached hereto, and including the right to xxx for and to enjoin and to collect damages for the actual or threatened misappropriation of any Trade Secret and for the breach or enforcement of any such Trade Secret license.

  • Copyright Security Agreement means each Copyright Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit A.

  • Canadian Security Agreements means those certain general security agreements and deeds of hypothec dated on or about the date hereof, between each of the Canadian Loan Parties and the Agent.